All of lore.kernel.org
 help / color / mirror / Atom feed
From: kernel test robot <lkp@intel.com>
To: kbuild-all@lists.01.org
Subject: Re: [PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets
Date: Fri, 19 Nov 2021 11:51:12 +0800	[thread overview]
Message-ID: <202111191130.QVBu9S3B-lkp@intel.com> (raw)
In-Reply-To: <20211118113359.642571-4-dovmurik@linux.ibm.com>

[-- Attachment #1: Type: text/plain, Size: 3461 bytes --]

Hi Dov,

Thank you for the patch! Yet something to improve:

[auto build test ERROR on 42eb8fdac2fc5d62392dcfcf0253753e821a97b0]

url:    https://github.com/0day-ci/linux/commits/Dov-Murik/Allow-guest-access-to-EFI-confidential-computing-secret-area/20211118-193724
base:   42eb8fdac2fc5d62392dcfcf0253753e821a97b0
config: riscv-allyesconfig (attached as .config)
compiler: riscv64-linux-gcc (GCC) 11.2.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://github.com/0day-ci/linux/commit/547e54014b34e24cd885e941dd66e3fdece3c0c6
        git remote add linux-review https://github.com/0day-ci/linux
        git fetch --no-tags linux-review Dov-Murik/Allow-guest-access-to-EFI-confidential-computing-secret-area/20211118-193724
        git checkout 547e54014b34e24cd885e941dd66e3fdece3c0c6
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross ARCH=riscv 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All errors (new ones prefixed by >>):

   drivers/virt/coco/efi_secret/efi_secret.c: In function 'efi_secret_map_area':
>> drivers/virt/coco/efi_secret/efi_secret.c:181:26: error: implicit declaration of function 'ioremap_encrypted' [-Werror=implicit-function-declaration]
     181 |         s->secret_data = ioremap_encrypted(secret_area->base_pa, secret_area->size);
         |                          ^~~~~~~~~~~~~~~~~
   drivers/virt/coco/efi_secret/efi_secret.c:181:24: warning: assignment to 'void *' from 'int' makes pointer from integer without a cast [-Wint-conversion]
     181 |         s->secret_data = ioremap_encrypted(secret_area->base_pa, secret_area->size);
         |                        ^
   cc1: some warnings being treated as errors


vim +/ioremap_encrypted +181 drivers/virt/coco/efi_secret/efi_secret.c

   157	
   158	static int efi_secret_map_area(void)
   159	{
   160		int ret;
   161		struct efi_secret *s = efi_secret_get();
   162		struct linux_efi_coco_secret_area *secret_area;
   163	
   164		if (efi.coco_secret == EFI_INVALID_TABLE_ADDR) {
   165			pr_err("Secret area address is not available\n");
   166			return -EINVAL;
   167		}
   168	
   169		secret_area = memremap(efi.coco_secret, sizeof(*secret_area), MEMREMAP_WB);
   170		if (secret_area == NULL) {
   171			pr_err("Could not map secret area EFI config entry\n");
   172			return -ENOMEM;
   173		}
   174		if (!secret_area->base_pa || secret_area->size < sizeof(struct secret_header)) {
   175			pr_err("Invalid secret area memory location (base_pa=0x%llx size=0x%llx)\n",
   176			       secret_area->base_pa, secret_area->size);
   177			ret = -EINVAL;
   178			goto unmap;
   179		}
   180	
 > 181		s->secret_data = ioremap_encrypted(secret_area->base_pa, secret_area->size);
   182		if (s->secret_data == NULL) {
   183			pr_err("Could not map secret area\n");
   184			ret = -ENOMEM;
   185			goto unmap;
   186		}
   187	
   188		s->secret_data_len = secret_area->size;
   189		ret = 0;
   190	
   191	unmap:
   192		memunmap(secret_area);
   193		return ret;
   194	}
   195	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

[-- Attachment #2: config.gz --]
[-- Type: application/gzip, Size: 71938 bytes --]

  parent reply	other threads:[~2021-11-19  3:51 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-18 11:33 [PATCH v5 0/4] Allow guest access to EFI confidential computing secret area Dov Murik
2021-11-18 11:33 ` [PATCH v5 1/4] efi: Save location of EFI confidential computing area Dov Murik
2021-11-18 11:33 ` [PATCH v5 2/4] efi/libstub: Reserve confidential computing secret area Dov Murik
2021-11-18 11:33 ` [PATCH v5 3/4] virt: Add efi_secret module to expose confidential computing secrets Dov Murik
2021-11-18 12:43   ` Greg KH
2021-11-18 16:13   ` kernel test robot
2021-11-19  3:51   ` kernel test robot [this message]
2021-11-18 11:33 ` [PATCH v5 4/4] docs: security: Add coco/efi_secret documentation Dov Murik

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202111191130.QVBu9S3B-lkp@intel.com \
    --to=lkp@intel.com \
    --cc=kbuild-all@lists.01.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.